Pwn2Own Vancouver 2024: Safety Researchers Rack Up $1.13M with 29 Zero-Day Exploits

Pwn2Own Vancouver 2024 Security Researchers Rack Up 113M with 29

All through the occasion, opponents demonstrated their prowess by attaining code execution and escalating privileges on absolutely patched techniques. Notable targets included Home windows 11, Ubuntu Desktop, VMware Workstation, Oracle VirtualBox, in addition to standard internet browsers corresponding to Apple Safari, Google Chrome, and Microsoft Edge. Even the Tesla Mannequin 3 fell sufferer to profitable exploitation.

Nevertheless, distributors are actually on the clock, having 90 days to launch safety fixes for the zero-day vulnerabilities reported throughout Pwn2Own contests earlier than TrendMicro’s Zero Day Initiative discloses them publicly.

Pwn2Own Vancouver 2024 leaderboardPwn2Own Vancouver 2024 leaderboardPwn2Own Vancouver 2024 leaderboard (ZDI)

The standout performer of this 12 months’s version was Manfred Paul, clinching victory with 25 Grasp of Pwn factors and a considerable $202,500 in earnings. Paul’s exploits included hacking into Apple Safari, Google Chrome, and Microsoft Edge internet browsers, demonstrating a mastery of numerous assault strategies.

Among the many highlights of Day 1 was Synacktiv’s outstanding achievement of securing a Tesla Mannequin 3 and $200,000 after efficiently hacking the Tesla ECU utilizing an integer overflow exploit inside a mere 30 seconds.

Notify of
Inline Feedbacks
View all comments
Previous Post
Converts Scanning Reports To A Tabular Format

Converts Scanning Experiences To A Tabular Format

Next Post
Data Wiping Malware Dubbed AcidPour Strikes Linux x86 Systems

Information-Wiping Malware Dubbed AcidPour Strikes Linux x86 Techniques

Related Posts